

Compest Solutions Inc.
Splunk Developer
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a Splunk Developer in the financial domain, based in Riverwoods, IL, with a contract length of "unknown" and a pay rate of $35.00 - $40.00 per hour. Key skills include Splunk Cloud, Core Java, Python, and AWS.
π - Country
United States
π± - Currency
$ USD
-
π° - Day rate
320
-
ποΈ - Date
October 9, 2025
π - Duration
Unknown
-
ποΈ - Location
Hybrid
-
π - Contract
Unknown
-
π - Security
Unknown
-
π - Location detailed
Riverwoods, IL
-
π§ - Skills detailed
#Linux #JavaScript #Clustering #Microservices #Docker #Visualization #Web Services #Grafana #DevOps #Computer Science #Big Data #Debugging #Java #Azure #Data Governance #Kubernetes #React #Elastic Stack #Spring Boot #PostgreSQL #Terraform #Hadoop #Automation #GCP (Google Cloud Platform) #Compliance #Firewalls #Splunk #Monitoring #HTML (Hypertext Markup Language) #Python #Indexing #Scrum #Cloud #Logging #Scripting #Agile #Kafka (Apache Kafka) #Observability #IAM (Identity and Access Management) #Programming #Security #SQL (Structured Query Language) #Complex Queries #Data Pipeline #Data Ingestion #TypeScript #"ETL (Extract #Transform #Load)" #JSON (JavaScript Object Notation) #AWS (Amazon Web Services) #Unix #VPN (Virtual Private Network) #Databases #Angular #Data Quality #Bash
Role description
Job title: Splunk DeveloperClient: financial domainLocation: Riverwoods, IL (Chicago area) β Onsite/4 day hybrid mandatory
Please reply with your expected Contract range--
Skilled inSplunk Cloud, Splunk Enterprise, Core Java, Spring Boot, Microservices, TypeScript, Python Linux/Unix, WebSphere Application Server, Splunk Admin and Development, Trend Micro Anti-Virus, Active Directory, Juniper SSL VPN, Bluecoat Proxy Reporter(To Moniter Logs), Axway Mail Gateway, RSA SecureId, Amazon Web Services (AWS) cloud, Elastic Stack (ELK), Grafana, PostgreSQL, Kubernetes
Job Description/ Responsibilities
Position Summary
The Splunk Developer will design, develop, deploy, and optimize Splunk-based solutions to provide realβtime visibility, alerting, dashboards, and reporting across financial systems, security, operations, and user behavior. The role is central to enabling observability, operational intelligence, and security monitoring within a large-scale, regulated financial environment.
Key Responsibilities
Develop, maintain, and optimize Splunk dashboards, searches, alerts, and reports to support operations, security, risk, and business analytics.
Ingest, parse, normalize, and correlate data from multiple sources (logs, syslog, databases, APIs, applications, cloud services).
Write efficient SPL (Search Processing Language) queries; tune searches for performance, reduce latency.
Design and build Splunk apps, add-ons, and modular inputs.
Support Splunk infrastructure operation: clustering, indexing, forwarders, ingestion pipelines, data retention, capacity planning.
Troubleshoot Splunk platform issues, high search load, data ingestion errors, query performance bottlenecks.
Partner with cross-functional teams (DevOps, Security, Infrastructure, SRE, Application Owners) to ensure comprehensive logging, instrumentation, and observability.
Collaborate with stakeholders to gather requirements and turn them into actionable Splunk visualizations, alerting logic, dashboards.
Participate in incident response / root cause analysis using Splunk data.
Enforce data quality, data governance, role-based access controls, and compliance (especially in a financial environment).
Stay up to date with Splunkβs latest features, best practices, and continuous improvement of observability tooling.
Required Qualifications
Bachelorβs degree in Computer Science, Information Systems, or related technical field (or equivalent experience).
3β5 years (or more) of hands-on experience with Splunk development and administration in production environments.
Strong mastery of SPL and experience building complex queries, correlation searches, scheduling, alerts.
Experience with Splunk architecture (indexers, forwarders, clustering, heavy forwarders).
Experience ingesting and parsing data from varied sources (syslog, APIs, application logs, JSON, CSV, databases).
Proficient with scripting (Python, Bash, PowerShell) to build data ingestion scripts, automation, integrations.
Solid knowledge of Linux / Unix, networking (TCP/UDP, syslog, firewalls).
Familiarity with logging standards, structured logging, JSON logs, regex, field extractions.
Experience with security / compliance / audit logging in regulated industries (financial, banking).
Strong problem-solving, analytical thinking, debugging, and performance optimization skills.
Good communication and collaboration skills; ability to translate technical insights to business stakeholders.
Ability to work in agile / SCRUM environment and deliver iterative value.
Preferred / Nice-to-Have Skills
Experience with Splunk Enterprise Security (ES), ITSI, SOAR or other Splunk premium apps.
Experience working in financial services, banking, risk, fraud, compliance, or payment processing systems.
Exposure to cloud logging / observability (AWS / Azure / GCP).
Familiarity with big data technologies (Kafka, Hadoop, ELK) or data pipelines.
Knowledge of security detection engineering, threat hunting, SIEM use cases.
Experience with containerized environments (Docker, Kubernetes) and observability in microservice architectures.
Experience building UI dashboards with frameworks (React, Angular) or embedding Splunk dashboards in custom UIs.
Certification(s) in Splunk (e.g. Splunk Certified Admin, Splunk Certified Developer).
Regards,Compest Solutions IncD: 647-660-7562
Job Type: Contract
Pay: $35.00 - $40.00 per hour
Expected hours: 40 per week
Experience:
Splunk Developer: 8 years (Preferred)
Splunk Engineer: 8 years (Preferred)
Splunk Enterprise Server: 6 years (Preferred)
Python (Programming Language): 5 years (Preferred)
Core Java developer: 6 years (Preferred)
Identity & Access Management (IAM): 8 years (Preferred)
Amazon Web Services (AWS) Cloud: 7 years (Preferred)
Terraform: 6 years (Preferred)
SQL, ETL, Datawarehouse: 7 years (Preferred)
Unix/Linux/Ubuntu: 7 years (Preferred)
Splunk Core & Cloud: 6 years (Preferred)
HTML, CSS, JavaScript: 6 years (Preferred)
Splunk Enterprise (v8.4.2 β v9.0.4): 4 years (Preferred)
License/Certification:
Splunk Certified Power User (Preferred)
Splunk Certified Admin (Preferred)
Work Location: On the road
Job title: Splunk DeveloperClient: financial domainLocation: Riverwoods, IL (Chicago area) β Onsite/4 day hybrid mandatory
Please reply with your expected Contract range--
Skilled inSplunk Cloud, Splunk Enterprise, Core Java, Spring Boot, Microservices, TypeScript, Python Linux/Unix, WebSphere Application Server, Splunk Admin and Development, Trend Micro Anti-Virus, Active Directory, Juniper SSL VPN, Bluecoat Proxy Reporter(To Moniter Logs), Axway Mail Gateway, RSA SecureId, Amazon Web Services (AWS) cloud, Elastic Stack (ELK), Grafana, PostgreSQL, Kubernetes
Job Description/ Responsibilities
Position Summary
The Splunk Developer will design, develop, deploy, and optimize Splunk-based solutions to provide realβtime visibility, alerting, dashboards, and reporting across financial systems, security, operations, and user behavior. The role is central to enabling observability, operational intelligence, and security monitoring within a large-scale, regulated financial environment.
Key Responsibilities
Develop, maintain, and optimize Splunk dashboards, searches, alerts, and reports to support operations, security, risk, and business analytics.
Ingest, parse, normalize, and correlate data from multiple sources (logs, syslog, databases, APIs, applications, cloud services).
Write efficient SPL (Search Processing Language) queries; tune searches for performance, reduce latency.
Design and build Splunk apps, add-ons, and modular inputs.
Support Splunk infrastructure operation: clustering, indexing, forwarders, ingestion pipelines, data retention, capacity planning.
Troubleshoot Splunk platform issues, high search load, data ingestion errors, query performance bottlenecks.
Partner with cross-functional teams (DevOps, Security, Infrastructure, SRE, Application Owners) to ensure comprehensive logging, instrumentation, and observability.
Collaborate with stakeholders to gather requirements and turn them into actionable Splunk visualizations, alerting logic, dashboards.
Participate in incident response / root cause analysis using Splunk data.
Enforce data quality, data governance, role-based access controls, and compliance (especially in a financial environment).
Stay up to date with Splunkβs latest features, best practices, and continuous improvement of observability tooling.
Required Qualifications
Bachelorβs degree in Computer Science, Information Systems, or related technical field (or equivalent experience).
3β5 years (or more) of hands-on experience with Splunk development and administration in production environments.
Strong mastery of SPL and experience building complex queries, correlation searches, scheduling, alerts.
Experience with Splunk architecture (indexers, forwarders, clustering, heavy forwarders).
Experience ingesting and parsing data from varied sources (syslog, APIs, application logs, JSON, CSV, databases).
Proficient with scripting (Python, Bash, PowerShell) to build data ingestion scripts, automation, integrations.
Solid knowledge of Linux / Unix, networking (TCP/UDP, syslog, firewalls).
Familiarity with logging standards, structured logging, JSON logs, regex, field extractions.
Experience with security / compliance / audit logging in regulated industries (financial, banking).
Strong problem-solving, analytical thinking, debugging, and performance optimization skills.
Good communication and collaboration skills; ability to translate technical insights to business stakeholders.
Ability to work in agile / SCRUM environment and deliver iterative value.
Preferred / Nice-to-Have Skills
Experience with Splunk Enterprise Security (ES), ITSI, SOAR or other Splunk premium apps.
Experience working in financial services, banking, risk, fraud, compliance, or payment processing systems.
Exposure to cloud logging / observability (AWS / Azure / GCP).
Familiarity with big data technologies (Kafka, Hadoop, ELK) or data pipelines.
Knowledge of security detection engineering, threat hunting, SIEM use cases.
Experience with containerized environments (Docker, Kubernetes) and observability in microservice architectures.
Experience building UI dashboards with frameworks (React, Angular) or embedding Splunk dashboards in custom UIs.
Certification(s) in Splunk (e.g. Splunk Certified Admin, Splunk Certified Developer).
Regards,Compest Solutions IncD: 647-660-7562
Job Type: Contract
Pay: $35.00 - $40.00 per hour
Expected hours: 40 per week
Experience:
Splunk Developer: 8 years (Preferred)
Splunk Engineer: 8 years (Preferred)
Splunk Enterprise Server: 6 years (Preferred)
Python (Programming Language): 5 years (Preferred)
Core Java developer: 6 years (Preferred)
Identity & Access Management (IAM): 8 years (Preferred)
Amazon Web Services (AWS) Cloud: 7 years (Preferred)
Terraform: 6 years (Preferred)
SQL, ETL, Datawarehouse: 7 years (Preferred)
Unix/Linux/Ubuntu: 7 years (Preferred)
Splunk Core & Cloud: 6 years (Preferred)
HTML, CSS, JavaScript: 6 years (Preferred)
Splunk Enterprise (v8.4.2 β v9.0.4): 4 years (Preferred)
License/Certification:
Splunk Certified Power User (Preferred)
Splunk Certified Admin (Preferred)
Work Location: On the road